|Publication number||US7861087 B2|
|Application number||US 11/832,434|
|Publication date||Dec 28, 2010|
|Filing date||Aug 1, 2007|
|Priority date||May 28, 2003|
|Also published as||US20040243852, US20070271599, WO2004107132A2, WO2004107132A3|
|Publication number||11832434, 832434, US 7861087 B2, US 7861087B2, US-B2-7861087, US7861087 B2, US7861087B2|
|Inventors||Adam H. Rosenstein|
|Original Assignee||Citrix Systems, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (191), Non-Patent Citations (6), Classifications (14), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This patent application claims priority to, and incorporates by reference in its entirety, U.S. patent application Ser. No. 10/857,536, entitled “Method, System and Software for State Signing of Internet Resources”, filed May 28, 2004, which claims priority to U.S. Provisional Patent Application No. 60/473,931, entitled “Method, System and Software for State Signing of Internet Resources” and filed May 28, 2003. This patent application incorporates by reference in its entirety each of the following co-pending U.S. patent applications: 1) “Method and System for Identifying Bidirectional Packet Flow” filed on May 28, 2004; 2) “Policy Based Network Address Translation” filed on May 28, 2004; and 3) “Multilayer Access Control Security System” filed on May 28, 2004.
Internet resources, and in particular web applications, are often developed with fields which can be altered or abused by those accessing a resource. However, the resource developer may assume that the resource is unalterable or secret (unpredictable or incapable of being guessed). These fields can include, for example, cookies, hidden inputs on forms and Uniform Resource Locators (“URLs”).
Many Internet applications, such as web sites and other corporate resources, can be infiltrated using only a text editor. Exemplary Internet attacks that exploit misplaced trust in client data include cookie tampering, parameter tampering, hidden field manipulation, stealth commanding, forceful browsing, Structured Query Language (SQL) injection, overflow attacks, and others application level attacks.
Current solutions to prevent field tampering exist in the form of software that monitors all traffic going to and from an Internet application. Based on a comprehensive rule set that identifies normal application use, existing products infer session information and analyze all Hypertext Transfer Protocol (“HTTP”) packets by putting all packets through a rule engine that represents the web application state machine. A rule set maintained by the rule engine mirrors the complexity of the web application and is derived using either explicit configuration or a “learning mode” which attempts to generate the state machine by observing presumably “correct” behavior.
Existing solutions have significant drawbacks, however, in terms of configuration complexity, scalability, performance and accuracy. Every web site or web application has a different set of rules that must be learned or configured into the system. Changes to the web site may cause the rule set to be rendered invalid and can require reconfiguration or relearning of a new rule set. The complexity of the rules also requires significant CPU capacity and memory to process each web transaction.
For the foregoing reasons, a need exists for a method, system and software for state signing to determine whether fields in a web page or other Internet resource have been altered or abused.
Before the present methods and systems are described, it is to be understood that this invention is not limited to the particular methodologies and systems described, as these may vary. It is also to be understood that the terminology used in the description is for the purpose of describing the particular versions or embodiments only, and is not intended to limit the scope of the present invention which will be limited only by the appended claims.
It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise. Thus, for example, reference to a “server” is a reference to one or more servers and equivalents thereof known to those skilled in the art, and so forth. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. Although any methods, materials, and devices similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present invention, the preferred methods, materials, and devices are now described. All publications mentioned herein are incorporated by reference. Nothing herein is to be construed as an admission that the invention is not entitled to antedate such disclosure by virtue of prior invention.
In an embodiment, a state signing procedure is used to encode the “state” of the web application into the page delivered to the client. In an embodiment, no server side configuration is required. In an alternate embodiment, the only configuration needed on the device (hardware, software, or combination thereof) implementing the state signing function is to enable or disable the state signing for a particular web site. Because a server requires only minimal configuration, web sites may incorporate the state signing system without otherwise modifying the web site or installing software containing complex rules. In an embodiment, the state signing procedure is implemented when the web server transmits the page (either directly or via a web proxy). Changes in the web application do not affect the state signing procedure because the web page is not signed until it is transmitted.
In an embodiment, state signing is performed by incorporating security metadata in transmissions from a network application server to a client. The security metadata may contain descriptions describing intended network application semantics. The security metadata may indicate how a URL, cookie, data integrity item (used in form field verification) or other network application element is to be used. At some point subsequent to the receipt of the requested network application element, the client transmits a request back to the server. The server may analyze the transmission from the client to determine if it conforms to the intended network application semantics and is safe to use.
Intended network application semantics are descriptions of ways in which information can be returned to the server from the client in a form that does not put the server at risk. Examples of intended network application semantics include: returning cookies to servers without modification by the client; clients following links presented to them by the server; clients not modifying the path portions of Uniform Resource Identifiers (“URIs”) before requesting them; clients not modifying queries embedded in the application data; and clients only supplying form data which conforms to the application's expectations or constraints. Constraints that may be used include the length of the data, type of the data, conformance to types of variables or expected values.
In an embodiment, a transmission of the application data from an application server is intercepted, proxied, processed or filtered to identify one or more URLs embedded within the transmissions. A predicted form of a client request containing the one or more URLs is generated, indicating how the URL is expected to be requested in the future, and security metadata containing constraints on the manner in which the client requests the one or more URLs is generated. The application data is combined with the security metadata and transmitted to the client. When the client returns the URI and the security metadata via a request, the URI is validated against the security metadata to ensure that the URI fits within the constraints by which the client may request the URLs.
In an embodiment, a cryptographic signature is applied over the predicted form of the client request containing the one or more URLs previously transmitted by the application server. The client may return the transmission including the security metadata and the cryptographic signature. The cryptographic signature may be verified to ensure that neither the metadata nor the URI have been altered.
In an embodiment, a system is generated in which a subsystem receives resource requests from a client to an application server, and a state signing subsystem signs responses to the resource requests delivered to a client from the application server to indicate authenticity. Each of the system and the subsystem may include one or more of hardware and software.
Enabling/disabling state signing for various data items may be controlled through policies tied to URL prefixes. In an embodiment, individual signatures are accompanied by a control word, embedded into the client side state, and covered by the signature. In an embodiment, the control word includes one or more flags and values which control how the signature is verified when the data item is returned.
The accompanying drawings, which are incorporated in and form a part of the specification, illustrate embodiments of the present invention and, together with the description serve to explain the principles of the invention.
In describing the embodiments of the invention illustrated in the drawings, specific terminology will be used for the sake of clarity. However, the invention is not intended to be limited to the specific terms so selected, and it is to be understood that each specific term includes all technical equivalents which operate in a similar manner to accomplish a similar purpose.
Computer program instructions for implementing a software embodiment of the present invention may be stored in a computer program memory or on a computer readable carrier such as a disk, memory stick, portable memory device, communications signal or carrier wave. The steps to complete the methods described herein may be carried out in any computer programming language including object oriented programs including but not limited to Java, C++, Visual Basic, Perl, PHP, and procedural programming languages such as C and Fortran. Other types of programming languages may be utilized, and the invention is not limited to any particular programming language, procedural, object oriented or otherwise.
Computing platforms for implementing the system include but are not limited to microprocessors and associated peripherals such as external Random Access Memory (RAM), Read Only Memory (ROM) and storage devices including but not limited to magnetic drives, optical and magneto-optical drives, removable storage devices including CD-ROMs, removable magnetic cards, or other types of fixed or removable storage devices. Network interfaces are also included in the computing platform in the form of Ethernet cards, adaptors or other components that allow the transmission and reception of data to and from other computers. Multiprocessor systems and network processors, used individually or coupled together, may be utilized. A computing platform may be constructed from elementary components including a microprocessor and associated peripherals, or may be a pre-assembled computer or computing workstation. The system may also be implemented on custom hardware including Application Specific Integrated Circuits (ASICs) or Field Programmable Gate Arrays (FPGAs). In addition, the system can be embodied in an application server as a web server module, servlets, CGI programs or scripts, server side includes, or directly into the web server source code, application source code either dynamically or statically, or into the operating system itself.
When the firewall/proxy 120 is used as a proxy, it may intercept all requests 102 made by the client 100 and determine if those requests are safe for the server 110. If the requests 102 are deemed to be safe, the proxy 120 forwards the request 103 to the server 110 on behalf of the client 100. In both cases, if the request 103 is approved, the application data 104 is returned from the server 110 to the client 100. Subsequent return requests 105 may be subject to the same inspection process to determine if they are safe for the server 110. In all cases, acceptable requests are forwarded to the server 110 without modification. In an embodiment, the firewall/proxy 120 also subjects application data 104 to tests that determine if the application data 104 carries signs of a successful attack. The application data 104 may be dropped if the tests indicate that an attack has been carried out.
Signatures are generated using keys and the text (data fields, metadata fields, or combinations thereof) to be signed. In an embodiment, the signature of a data item is generated using three inputs: UID, text, and key:
In an embodiment, a system-wide state signing key, the User ID (UID) associated with the request and the text of the data item (cookie or URL) modified with metadata are concatenated and used as input to a cryptographic signing algorithm. The resulting value from this signing operation may be appended to another permutation of the system-wide state signing key and used as input to the signing algorithm again. In this embodiment, the signature incorporates the identity of the user for whom it was generated in order to prevent the theft of signed elements from caches and cookie files as well as snooping (including proxies such as local proxies, reverse proxies, distributed proxies, corporate proxies, or other proxies).
In an embodiment, signing a data item means performing the following transformation over its text:
In addition to the signature itself, a control word may be incorporated into the item's text before signing it. The control word carries information used by the state signer 200 when later verifying the signature. In an embodiment, the control word is expressed as an ASCII-encoded 3-byte hex value (6 characters).
In an embodiment, CW 330 has the following grammar:
“F81” KEY QUERY SECURE
“0” for key 0 or “1” for key 1
“8” for ignore query or “C” for sign query
“0” for http backend 0 or “8” for https backend
In the abovementioned embodiment, eight legal hexadecimal values of CW 330 maybe used: 0xF81080, 0xF81000, 0xF81180, 0xF811 CO, 0xF81088, 0xF810C8, 0xF81188 and 0xF81C8. In an embodiment, CW 330 appears in a predictable location within any signed text, thus the presence of the text “F81” may be used to distinguish signed content from unsigned content. In this embodiment, extra “marker bits” are included in the control word.
ECW1 320 and ECW2 310 may be used for FVBs and Signature Expiry Blocks (SEBs), respectively. SEBs may contain an ASCII-encoded date (e.g. ASN.1) beyond which the signature is considered invalid. Each may be used for other purposes as well and may act as extensions to CW 330.
It is preferable, for security reasons, to update or regenerate the key used for encryption periodically to protect against the possibility of undetected key compromise. In an embodiment, a system-wide key is used rather than per connection, per-application, or per-user keys. In this embodiment, two keys are active in the system at any given time to allow for periodic rotation of the keys. A simple index may be used to track which key is active. In alternate embodiments, a larger number of keys can be used, or the keys can be varied for each connection, application or user. As will be understood by one skilled in the art, a variety of security techniques may be applied for key generation, and public key and/or private key systems may be used.
Changing or rotating keys may result in a broken client-side state resulting in unusable bookmarks, cookies and/or cached web pages. In an embodiment, the key regeneration interval is set to one month to allow for a maximum two-week window of usability for the client-side state. In addition, the system administrator may cause the state signer 200 to return a “301 Permanent Redirect” message for requests using a key that is valid but not current. This redirect may include a URI signed using the current key. This process may permit bookmarks and cache entries to be updated in many types of Internet browsers including INTERNET EXPLORER® browsers produced by Microsoft Corporation. In this embodiment, bookmarks remain current as long as they are requested at least once every key refresh period. In an alternate embodiment, link verifier software is used to verify the link and refresh broken links with data signed by the current key.
In an embodiment, keys are 20 bytes long and are cryptographically random. In this embodiment, the keys are generated by a random number generator, such as the random number generator produced by Cavium Networks. Other embodiments with longer or shorter keys are possible, and as previously mentioned, a number of key generation techniques may be utilized.
In an embodiment, cookie signing can be enabled or disabled. In this embodiment, cookie signing may be controlled on the basis of the URI prefix of the requested URI, as well as the URI prefix of the cookie's PATH attribute. In this embodiment, if cookie signing is disabled on any URI prefix, the setting is not re-enabled on any URL descendant of that prefix.
A cookie may not always bear a PATH attribute. For a cookie without a PATH attribute, the standard protocol may be to default to the request-host for the domain and the path of the request URL that generated the set-cookie response, up to, but not including, the right-most “I.” Preferably, all cookie signing operations occur only on the re-written cookie attributes. In this embodiment, cookie signing takes place after the rewrite on the request headers, but before the rewrite on the response headers. When an incoming Cookie:request header or Set-Cookie:response header is received, a prefix table lookup may be performed over the text of its PATH attribute. If cookie signing is enabled, for that PATH, a valid signature must appear on that cookie. If not, the cookie may be passed through unmodified. A management interface may be provided to ensure that if cookie signing is disabled on any particular prefix, other policies bearing that prefix “inherit” that state.
With respect to cookie requests, the process may be initiated by consulting a policy database to determine the state of the cookie signing feature (enabled/disabled) for both signature checking and the subsequent signature generation. In an embodiment, the authenticated user ID of the requestor is also examined.
For cookie bearing requests that need to be verified, a signature may be generated over the user ID and the name value text (plus control word and metadata). The generated signature may be compared to the signature embedded in the returned cookie to determine if the generated signature is indeed verified. If the generated signature is verified, the cookie passes verification. If it is not verified, the cookie, along with its associated attributes, is deleted from the output stream.
For cookie bearing replies, the state of the cookie signing feature associated with the original URI request may be recalled.
In a next step for cookie replies, a scan may be performed at the application layer to detect cookie headers and to return the appropriate fields including the cookie name, value, domain, and path. This step may also be performed on cookie requests.
For identified cookies, a control word may be added. The cookie may then be signed and appropriately inserted into the output stream.
For URL signing, relative URLs may first be resolved to permit signing. Exemplary URLs that need to be resolved may include network-path references, absolute-path references and relative-path references. Although fully resolved URLs are used in signature generation, the output stream may not need to reference the fully resolved URL.
In both cookie and URI signing, the state signer 200 may remove the signature, CW 330 and associated metadata from the requested URI and/or cookie before forwarding it to the application server 110.
Although the invention has been described with reference to the preferred embodiments, it will be apparent to one skilled in the art that variations and modifications are contemplated within the spirit and scope of the invention. The drawings and description of the preferred embodiments are made by way of example rather than to limit the scope of the invention, and it is intended to cover within the spirit and scope of the invention all such changes and modifications.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5708780||Jun 7, 1995||Jan 13, 1998||Open Market, Inc.||Internet server access control and monitoring systems|
|US5758085||Jan 8, 1997||May 26, 1998||International Business Machines Corporation||Semiconductor memory based server for providing multimedia information on demand over wide area networks|
|US5862325||Sep 27, 1996||Jan 19, 1999||Intermind Corporation||Computer-based communication system and method using metadata defining a control structure|
|US5867494||Nov 18, 1996||Feb 2, 1999||Mci Communication Corporation||System, method and article of manufacture with integrated video conferencing billing in a communication system architecture|
|US5999525||Nov 18, 1996||Dec 7, 1999||Mci Communications Corporation||Method for video telephony over a hybrid network|
|US6006242||Apr 5, 1996||Dec 21, 1999||Bankers Systems, Inc.||Apparatus and method for dynamically creating a document|
|US6226618||Aug 13, 1998||May 1, 2001||International Business Machines Corporation||Electronic content delivery system|
|US6256773||Aug 31, 1999||Jul 3, 2001||Accenture Llp||System, method and article of manufacture for configuration management in a development architecture framework|
|US6263363||Jan 28, 1999||Jul 17, 2001||Skydesk, Inc.||System and method for creating an internet-accessible working replica of a home computer on a host server controllable by a user operating a remote access client computer|
|US6289382||Aug 31, 1999||Sep 11, 2001||Andersen Consulting, Llp||System, method and article of manufacture for a globally addressable interface in a communication services patterns environment|
|US6324647||Aug 31, 1999||Nov 27, 2001||Michel K. Bowman-Amuah||System, method and article of manufacture for security management in a development architecture framework|
|US6332163||Sep 1, 1999||Dec 18, 2001||Accenture, Llp||Method for providing communication services over a computer network system|
|US6335927||Nov 18, 1996||Jan 1, 2002||Mci Communications Corporation||System and method for providing requested quality of service in a hybrid network|
|US6339832||Aug 31, 1999||Jan 15, 2002||Accenture Llp||Exception response table in environment services patterns|
|US6370573||Aug 31, 1999||Apr 9, 2002||Accenture Llp||System, method and article of manufacture for managing an environment of a development architecture framework|
|US6400996||Feb 1, 1999||Jun 4, 2002||Steven M. Hoffberg||Adaptive pattern recognition based control system and method|
|US6405364||Aug 31, 1999||Jun 11, 2002||Accenture Llp||Building techniques in a development architecture framework|
|US6434568||Aug 31, 1999||Aug 13, 2002||Accenture Llp||Information services patterns in a netcentric environment|
|US6434628||Aug 31, 1999||Aug 13, 2002||Accenture Llp||Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patterns|
|US6438594||Aug 31, 1999||Aug 20, 2002||Accenture Llp||Delivering service to a client via a locally addressable interface|
|US6442748||Aug 31, 1999||Aug 27, 2002||Accenture Llp||System, method and article of manufacture for a persistent state and persistent object separator in an information services patterns environment|
|US6473794||May 27, 1999||Oct 29, 2002||Accenture Llp||System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework|
|US6477580||Aug 31, 1999||Nov 5, 2002||Accenture Llp||Self-described stream in a communication services patterns environment|
|US6477665||Aug 31, 1999||Nov 5, 2002||Accenture Llp||System, method, and article of manufacture for environment services patterns in a netcentic environment|
|US6496850||Aug 31, 1999||Dec 17, 2002||Accenture Llp||Clean-up of orphaned server contexts|
|US6502102||Mar 27, 2000||Dec 31, 2002||Accenture Llp||System, method and article of manufacture for a table-driven automated scripting architecture|
|US6502213||Aug 31, 1999||Dec 31, 2002||Accenture Llp||System, method, and article of manufacture for a polymorphic exception handler in environment services patterns|
|US6514085||Jul 30, 1999||Feb 4, 2003||Element K Online Llc||Methods and apparatus for computer based training relating to devices|
|US6515968||Sep 24, 1998||Feb 4, 2003||Worldcom, Inc.||Integrated interface for real time web based viewing of telecommunications network call traffic|
|US6519571||May 27, 1999||Feb 11, 2003||Accenture Llp||Dynamic customer profile management|
|US6523027||Jul 30, 1999||Feb 18, 2003||Accenture Llp||Interfacing servers in a Java based e-commerce architecture|
|US6529909||Aug 31, 1999||Mar 4, 2003||Accenture Llp||Method for translating an object attribute converter in an information services patterns environment|
|US6529948||Aug 31, 1999||Mar 4, 2003||Accenture Llp||Multi-object fetch component|
|US6536037||May 27, 1999||Mar 18, 2003||Accenture Llp||Identification of redundancies and omissions among components of a web based architecture|
|US6539396||Aug 31, 1999||Mar 25, 2003||Accenture Llp||Multi-object identifier system and method for information service pattern environment|
|US6549949||Aug 31, 1999||Apr 15, 2003||Accenture Llp||Fixed format stream in a communication services patterns environment|
|US6550057||Aug 31, 1999||Apr 15, 2003||Accenture Llp||Piecemeal retrieval in an information services patterns environment|
|US6571282||Aug 31, 1999||May 27, 2003||Accenture Llp||Block-based communication in a communication services patterns environment|
|US6578068||Aug 31, 1999||Jun 10, 2003||Accenture Llp||Load balancer in environment services patterns|
|US6584569||Mar 5, 2001||Jun 24, 2003||Sanctum Ltd.||System for determining web application vulnerabilities|
|US6601192||Aug 31, 1999||Jul 29, 2003||Accenture Llp||Assertion component in environment services patterns|
|US6601233||Jul 30, 1999||Jul 29, 2003||Accenture Llp||Business components framework|
|US6601234||Aug 31, 1999||Jul 29, 2003||Accenture Llp||Attribute dictionary in a business logic services environment|
|US6606660||Aug 31, 1999||Aug 12, 2003||Accenture Llp||Stream-based communication in a communication services patterns environment|
|US6606744||Nov 22, 1999||Aug 12, 2003||Accenture, Llp||Providing collaborative installation management in a network-based supply chain environment|
|US6609128||Jul 30, 1999||Aug 19, 2003||Accenture Llp||Codes table framework design in an E-commerce architecture|
|US6615166||May 27, 1999||Sep 2, 2003||Accenture Llp||Prioritizing components of a network framework required for implementation of technology|
|US6615199||Aug 31, 1999||Sep 2, 2003||Accenture, Llp||Abstraction factory in a base services pattern environment|
|US6615253||Aug 31, 1999||Sep 2, 2003||Accenture Llp||Efficient server side data retrieval for execution of client side applications|
|US6629081||Dec 22, 1999||Sep 30, 2003||Accenture Llp||Account settlement and financing in an e-commerce environment|
|US6633878||Jul 30, 1999||Oct 14, 2003||Accenture Llp||Initializing an ecommerce database framework|
|US6636242||Aug 31, 1999||Oct 21, 2003||Accenture Llp||View configurer in a presentation services patterns environment|
|US6640145||Jun 3, 2002||Oct 28, 2003||Steven Hoffberg||Media recording device with packet data interface|
|US6640238||Aug 31, 1999||Oct 28, 2003||Accenture Llp||Activity component in a presentation services patterns environment|
|US6640240||May 9, 2002||Oct 28, 2003||Pivia, Inc.||Method and apparatus for a dynamic caching system|
|US6640244||Aug 31, 1999||Oct 28, 2003||Accenture Llp||Request batcher in a transaction services patterns environment|
|US6640249||Aug 31, 1999||Oct 28, 2003||Accenture Llp||Presentation services patterns in a netcentric environment|
|US6643652||Jan 12, 2001||Nov 4, 2003||Saba Software, Inc.||Method and apparatus for managing data exchange among systems in a network|
|US6662357||Aug 31, 1999||Dec 9, 2003||Accenture Llp||Managing information in an integrated development architecture framework|
|US6671818||Nov 22, 1999||Dec 30, 2003||Accenture Llp||Problem isolation through translating and filtering events into a standard object format in a network based supply chain|
|US6701345||Apr 13, 2000||Mar 2, 2004||Accenture Llp||Providing a notification when a plurality of users are altering similar data in a health care solution environment|
|US6701514||Mar 27, 2000||Mar 2, 2004||Accenture Llp||System, method, and article of manufacture for test maintenance in an automated scripting framework|
|US6704873||Jul 30, 1999||Mar 9, 2004||Accenture Llp||Secure gateway interconnection in an e-commerce based environment|
|US6715145||Aug 31, 1999||Mar 30, 2004||Accenture Llp||Processing pipeline in a base services pattern environment|
|US6718535||Jul 30, 1999||Apr 6, 2004||Accenture Llp||System, method and article of manufacture for an activity framework design in an e-commerce based environment|
|US6721713||May 27, 1999||Apr 13, 2004||Andersen Consulting Llp||Business alliance identification in a web architecture framework|
|US6721747||Jan 12, 2001||Apr 13, 2004||Saba Software, Inc.||Method and apparatus for an information server|
|US6725425||Mar 22, 2000||Apr 20, 2004||Yodlee.Com||Method and apparatus for retrieving information from semi-structured, web-based data sources|
|US6728000||May 23, 2000||Apr 27, 2004||Silverbrook Research Pty Ltd||Method and system for printing a document|
|US6731625||Feb 10, 1997||May 4, 2004||Mci Communications Corporation||System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony|
|US6742015||Aug 31, 1999||May 25, 2004||Accenture Llp||Base services patterns in a netcentric environment|
|US6754181||Nov 18, 1996||Jun 22, 2004||Mci Communications Corporation||System and method for a directory service supporting a hybrid communication system architecture|
|US6766944||Nov 12, 2002||Jul 27, 2004||Silverbrook Research Pty Ltd||Computer system interface surface with processing sensor|
|US6795089||Dec 20, 2000||Sep 21, 2004||Microsoft Corporation||Dynamic, live surface and model elements for visualization and modeling|
|US6795593||Nov 12, 2002||Sep 21, 2004||Silverbrook Research Pty Ltd||Sensing device with processor|
|US6839053||Nov 12, 2002||Jan 4, 2005||Silverbrook Research Pty Ltd||Hand-drawing capture via interface surface and processing sensor|
|US6842906||Aug 31, 1999||Jan 11, 2005||Accenture Llp||System and method for a refreshable proxy pool in a communication services patterns environment|
|US6850252||Oct 5, 2000||Feb 1, 2005||Steven M. Hoffberg||Intelligent electronic appliance system and method|
|US6850893||Jan 12, 2001||Feb 1, 2005||Saba Software, Inc.||Method and apparatus for an improved security system mechanism in a business applications management system platform|
|US6859212||Apr 4, 2001||Feb 22, 2005||Yodlee.Com, Inc.||Interactive transaction center interface|
|US6862105||Nov 12, 2002||Mar 1, 2005||Silverbrook Research Pty Ltd||Method and system for composition and delivery of electronic mail using processing sensor|
|US6891953||Jun 27, 2000||May 10, 2005||Microsoft Corporation||Method and system for binding enhanced software features to a persona|
|US6895084||Sep 14, 2001||May 17, 2005||Microstrategy, Inc.||System and method for generating voice pages with included audio files for use in a voice page delivery system|
|US6904449||Jan 14, 2000||Jun 7, 2005||Accenture Llp||System and method for an application provider framework|
|US6907546||Mar 27, 2000||Jun 14, 2005||Accenture Llp||Language-driven interface for an automated testing framework|
|US6909708||Nov 18, 1996||Jun 21, 2005||Mci Communications Corporation||System, method and article of manufacture for a communication system architecture including video conferencing|
|US6914593||Nov 12, 2002||Jul 5, 2005||Silverbrook Research Pty Ltd||Computer system control with user data via interface surface and processing sensor|
|US6954736||Mar 23, 2001||Oct 11, 2005||Restaurant Services, Inc.||System, method and computer program product for order confirmation in a supply chain management framework|
|US6957186||May 27, 1999||Oct 18, 2005||Accenture Llp||System method and article of manufacture for building, managing, and supporting various components of a system|
|US6970849||Jun 27, 2000||Nov 29, 2005||Microsoft Corporation||Inter-server communication using request with encrypted parameter|
|US6976090||Feb 16, 2001||Dec 13, 2005||Actona Technologies Ltd.||Differentiated content and application delivery via internet|
|US6982807||Nov 12, 2002||Jan 3, 2006||Silverbrook Research Pty Ltd||Method and system for delivery of a facsimile using processing sensor|
|US6989911||Nov 12, 2002||Jan 24, 2006||Silverbrook Research Pty Ltd||Method and system for delivery of a facsimile using coded marks|
|US6990453||Apr 20, 2001||Jan 24, 2006||Landmark Digital Services Llc||System and methods for recognizing sound and music signals in high noise and distortion|
|US7006881||Oct 24, 2003||Feb 28, 2006||Steven Hoffberg||Media recording device with remote graphic user interface|
|US7010147||Nov 12, 2002||Mar 7, 2006||Silverbrook Research Pty Ltd||Signature capture via interface surface using processing sensor|
|US7013290||Jul 26, 2002||Mar 14, 2006||John Allen Ananian||Personalized interactive digital catalog profiling|
|US7023979||Mar 7, 2003||Apr 4, 2006||Wai Wu||Telephony control system with intelligent call routing|
|US7031010||Nov 12, 2002||Apr 18, 2006||Silverbrook Research Pty Ltd||Method and system for delivery of mail using processing sensor|
|US7039606||Mar 23, 2001||May 2, 2006||Restaurant Services, Inc.||System, method and computer program product for contract consistency in a supply chain management framework|
|US7041916||Nov 12, 2002||May 9, 2006||Silverbrook Research Pty Ltd||Orientation sensing device with processor|
|US7043716||Jun 13, 2001||May 9, 2006||Arius Software Corporation||System and method for multiple level architecture by use of abstract application notation|
|US7047411||Jun 27, 2000||May 16, 2006||Microsoft Corporation||Server for an electronic distribution system and method of operating same|
|US7054367||Dec 31, 2001||May 30, 2006||Emc Corporation||Edge detection based on variable-length codes of block coded video|
|US7054837||May 28, 2004||May 30, 2006||Restaurant Services, Inc.||System, method and computer program product for utilizing market demand information for generating revenue|
|US7069234||Dec 22, 1999||Jun 27, 2006||Accenture Llp||Initiating an agreement in an e-commerce environment|
|US7072843||Mar 23, 2001||Jul 4, 2006||Restaurant Services, Inc.||System, method and computer program product for error checking in a supply chain management framework|
|US7072934||Jan 12, 2001||Jul 4, 2006||Saba Software, Inc.||Method and apparatus for a business applications server management system platform|
|US7076736||Nov 30, 2001||Jul 11, 2006||Thebrain Technologies Corp.||Method and apparatus for sharing many thought databases among many clients|
|US7085850 *||Aug 22, 2001||Aug 1, 2006||International Business Machines Corporation||Stateless message processing scheme for network processors interactions|
|US7089583||Jan 12, 2001||Aug 8, 2006||Saba Software, Inc.||Method and apparatus for a business applications server|
|US7100195||Jul 30, 1999||Aug 29, 2006||Accenture Llp||Managing user information on an e-commerce system|
|US7102772||May 23, 2000||Sep 5, 2006||Silverbrook Research Pty Ltd||Method and system for delivery of a facsimile|
|US7107285||Mar 14, 2003||Sep 12, 2006||Questerra Corporation||Method, system, and program for an improved enterprise spatial system|
|US7113934||Mar 6, 2003||Sep 26, 2006||Fujitsu Limited||Element management system with adaptive interfacing selected by last previous full-qualified managed level|
|US7117504||Jul 10, 2001||Oct 3, 2006||Microsoft Corporation||Application program interface that enables communication for a network software platform|
|US7118025||Nov 12, 2002||Oct 10, 2006||Silverbrook Research Pty Ltd||Computer system control via interface surface and processing sensor|
|US7120596||Mar 23, 2001||Oct 10, 2006||Restaurant Services, Inc.||System, method and computer program product for landed cost reporting in a supply chain management framework|
|US7123239||May 23, 2000||Oct 17, 2006||Paul Lapstun||Computer system control with user data via interface surface|
|US7124101||Nov 22, 1999||Oct 17, 2006||Accenture Llp||Asset tracking in a network-based supply chain environment|
|US7130807||Nov 22, 1999||Oct 31, 2006||Accenture Llp||Technology sharing during demand and supply planning in a network-based supply chain environment|
|US7130812||Nov 26, 2003||Oct 31, 2006||Centergistic Solutions, Inc.||Method and system for managing real time data|
|US7134601||Oct 25, 2004||Nov 14, 2006||Silverbrook Research Pty Ltd||Method of generating a user interface for a computer system|
|US7139999||Aug 31, 1999||Nov 21, 2006||Accenture Llp||Development architecture framework|
|US7143089||Feb 10, 2001||Nov 28, 2006||Involve Technology, Inc.||System for creating and maintaining a database of information utilizing user opinions|
|US7145898||Nov 18, 1996||Dec 5, 2006||Mci Communications Corporation||System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture|
|US7149698||Sep 12, 2003||Dec 12, 2006||Accenture, Llp||Business alliance identification in a web architecture Framework|
|US7158953||Jun 27, 2000||Jan 2, 2007||Microsoft Corporation||Method and system for limiting the use of user-specific software features|
|US7165041||May 27, 1999||Jan 16, 2007||Accenture, Llp||Web-based architecture sales tool|
|US7167844||Dec 22, 1999||Jan 23, 2007||Accenture Llp||Electronic menu document creator in a virtual financial environment|
|US7171379||Mar 23, 2001||Jan 30, 2007||Restaurant Services, Inc.||System, method and computer program product for normalizing data in a supply chain management framework|
|US7185075||May 25, 2000||Feb 27, 2007||Fujitsu Limited||Element management system with dynamic database updates based on parsed snooping|
|US7196712||Sep 20, 2004||Mar 27, 2007||Microsoft Corporation||Dynamic, live surface and model elements for visualization and modeling|
|US7200804||Sep 1, 2000||Apr 3, 2007||Yodlee.Com, Inc.||Method and apparatus for providing automation to an internet navigation application|
|US7206805||Nov 17, 2000||Apr 17, 2007||Oracle International Corporation||Asynchronous transcription object management system|
|US7218779||Jan 21, 2003||May 15, 2007||Microsoft Corporation||Ink divider and associated application program interface|
|US7225040||Nov 14, 2001||May 29, 2007||Exxon Mobil Oil Corporation||Method and system for reducing lead-time in the packaging industry|
|US7225244||Apr 10, 2001||May 29, 2007||Ciena Corporation||Common command interface|
|US7227527||Nov 12, 2002||Jun 5, 2007||Silverbrook Research Pty Ltd||Handwritten text capture via interface surface and processing sensor|
|US7240150||Apr 30, 2004||Jul 3, 2007||Emc Corporation||Methods and apparatus for processing access requests in a content addressable computer system|
|US7484208||Dec 12, 2002||Jan 27, 2009||Michael Nelson||Virtual machine migration|
|US20010032207||Apr 5, 2001||Oct 18, 2001||Bruce Hartley||Operational system for operating on client defined rules|
|US20020032798||Aug 16, 2001||Mar 14, 2002||Wei Xu||Systems and methods for packet sequencing|
|US20020033844||Sep 11, 2001||Mar 21, 2002||Levy Kenneth L.||Content sensitive connected content|
|US20020049608||Jun 12, 2001||Apr 25, 2002||Hartsell Neal D.||Systems and methods for providing differentiated business services in information management environments|
|US20020049788||Jan 12, 2001||Apr 25, 2002||Lipkin Daniel S.||Method and apparatus for a web content platform|
|US20020049841||Jun 12, 2001||Apr 25, 2002||Johnson Scott C||Systems and methods for providing differentiated service in information management environments|
|US20020049900||Jan 5, 2001||Apr 25, 2002||International Business Machines Corporation, Armonk,New York, 10504||Method and apparatus for cryptographic stateless protocol using asymmetric encryption|
|US20020059274||Jun 12, 2001||May 16, 2002||Hartsell Neal D.||Systems and methods for configuration of information management systems|
|US20020065864||Jun 12, 2001||May 30, 2002||Hartsell Neal D.||Systems and method for resource tracking in information management environments|
|US20020099738||Nov 21, 2001||Jul 25, 2002||Grant Hugh Alexander||Automated web access for back-end enterprise systems|
|US20020116582||Dec 18, 2000||Aug 22, 2002||Copeland George P.||Batching of invalidations and new values in a web cache with dynamic content|
|US20020161801||Apr 26, 2001||Oct 31, 2002||Hind John R.||Efficient processing of extensible markup language documents in content based routing networks|
|US20020174227||Jun 12, 2001||Nov 21, 2002||Hartsell Neal D.||Systems and methods for prioritization in information management environments|
|US20020188890||Jun 4, 2002||Dec 12, 2002||Shupps Eric A.||System and method for testing an application|
|US20030041167||Aug 15, 2001||Feb 27, 2003||International Business Machines Corporation||Method and system for managing secure geographic boundary resources within a network management framework|
|US20030051142 *||May 16, 2001||Mar 13, 2003||Hidalgo Lluis Mora||Firewalls for providing security in HTTP networks and applications|
|US20030055883||Mar 29, 2002||Mar 20, 2003||Wiles Philip V.||Synthetic transaction monitor|
|US20030105977||Dec 5, 2001||Jun 5, 2003||International Business Machines Corporation||Offload processing for secure data transfer|
|US20030182431||Jan 13, 2003||Sep 25, 2003||Emil Sturniolo||Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments|
|US20030191812||Dec 19, 2001||Oct 9, 2003||International Business Machines Corporation||Method and system for caching role-specific fragments|
|US20030233544||Jun 14, 2002||Dec 18, 2003||Ulfar Erlingsson||Methods and systems for providing a secure application environment using derived user accounts|
|US20040031058||May 8, 2003||Feb 12, 2004||Richard Reisman||Method and apparatus for browsing using alternative linkbases|
|US20040049549||Feb 3, 2003||Mar 11, 2004||Slattery Terrance C.||System, method and computer-readable medium for generating user interfaces used in connection with a system for computer-based training|
|US20040073512||Feb 23, 2001||Apr 15, 2004||David Maung||Unique session storage design|
|US20040073630||Dec 18, 2000||Apr 15, 2004||Copeland George P.||Integrated JSP and command cache for web applications with dynamic content|
|US20040103147||Jun 10, 2003||May 27, 2004||Flesher Kevin E.||System for enabling collaboration and protecting sensitive data|
|US20040111639||Jun 10, 2003||Jun 10, 2004||Schwartz Michael I.||Information aggregation, processing and distribution system|
|US20040210320||May 12, 2004||Oct 21, 2004||Pandya Ashish A.||Runtime adaptable protocol processor|
|US20040268357||Jun 30, 2003||Dec 30, 2004||Joy Joseph M.||Network load balancing with session information|
|US20040268358||Jun 30, 2003||Dec 30, 2004||Microsoft Corporation||Network load balancing with host status information|
|US20050044089||Aug 21, 2003||Feb 24, 2005||Microsoft Corporation||Systems and methods for interfacing application programs with an item-based storage platform|
|US20050044108||Oct 24, 2003||Feb 24, 2005||Ashish Shah||Systems and methods for providing synchronization services for units of information manageable by a hardware/software interface system|
|US20050050053||Aug 21, 2003||Mar 3, 2005||Microsoft Corporation.||Systems and methods for the implementation of a core schema for providing a top-level structure for organizing units of information manageable by a hardware/software interface system|
|US20050063083||Oct 24, 2003||Mar 24, 2005||Dart Scott E.||Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system|
|US20050086206||Oct 15, 2003||Apr 21, 2005||International Business Machines Corporation||System, Method, and service for collaborative focused crawling of documents on a network|
|US20050154699||Nov 22, 2004||Jul 14, 2005||Saba Software, Inc.||Method and apparatus for an improved security system mechanism in a business applications management system platform|
|US20050192921||Feb 26, 2004||Sep 1, 2005||Microsoft Corporation||Database monitoring system|
|US20050210263||Sep 24, 2004||Sep 22, 2005||Levas Robert G||Electronic form routing and data capture system and method|
|US20050262063||Apr 26, 2005||Nov 24, 2005||Watchfire Corporation||Method and system for website analysis|
|US20060041635||May 28, 2004||Feb 23, 2006||Microsoft Corporation||Flexible teleport architecture|
|US20060047974||Aug 30, 2004||Mar 2, 2006||Alpern Bowen L||Method and apparatus for simplifying the deployment and serviceability of commercial software environments|
|US20060092861||Jul 7, 2005||May 4, 2006||Christopher Corday||Self configuring network management system|
|US20060123467||Dec 6, 2004||Jun 8, 2006||Sandeep Kumar||Performing message payload processing functions in a network element on behalf of an application|
|US20060129689||Dec 10, 2004||Jun 15, 2006||Ricky Ho||Reducing the sizes of application layer messages in a network element|
|US20060161671||Jan 14, 2005||Jul 20, 2006||Citrix Systems, Inc.||Method and systems for capture and replay of remote presentation protocol data|
|US20060161959||Jan 14, 2005||Jul 20, 2006||Citrix Systems, Inc.||Method and system for real-time seeking during playback of remote presentation protocols|
|US20070179955||Jan 18, 2007||Aug 2, 2007||Citrix Systems, Inc.||Methods and systems for providing authorized remote access to a computing environment provided by a virtual machine|
|US20070245409||Dec 5, 2006||Oct 18, 2007||James Harris||Systems and Methods for Providing Levels of Access and Action Control Via an SSL VPN Appliance|
|US20090125904||Jan 12, 2009||May 14, 2009||Michael Nelson||Virtual machine migration|
|US20090133015||Nov 14, 2008||May 21, 2009||Canon Kabushiki Kaisha||Driver management apparatus and method therefor|
|1||*||Cheng et al., A Security Architecture for the Internet Protocol, IBM System Journal, 1998, pp. 42-60.|
|2||*||Kent et al., RFC 2401-Security Architecture for the Internet Protocol, Nov. 1998, pp. 8-34.|
|3||*||Kent et al., RFC 2401—Security Architecture for the Internet Protocol, Nov. 1998, pp. 8-34.|
|4||*||Kent et al., RFC 2402-IP Authentication Header, Nov. 1998, pp. 2-15.|
|5||*||Kent et al., RFC 2402—IP Authentication Header, Nov. 1998, pp. 2-15.|
|6||*||PKCS #7: Cryptographic Message Syntax Standard, RSA Laboratories, Nov. 1993.|
|U.S. Classification||713/176, 713/153, 726/12|
|International Classification||H04L29/06, G06F, H04L29/00, G06F11/30, G06F21/00|
|Cooperative Classification||G06F21/606, G06F21/645, H04L63/123|
|European Classification||G06F21/64A, G06F21/60C, H04L63/12A|
|Jul 29, 2008||AS||Assignment|
Owner name: CAYMAS SYSTEMS, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROSENSTEIN, ADAM H.;REEL/FRAME:021305/0232
Effective date: 20040527
|May 28, 2014||FPAY||Fee payment|
Year of fee payment: 4